Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W4232461742', 'doi': 'https://doi.org/10.3403/19978206u', 'title': 'Information technology. Security techniques. A framework for IT security assurance', 'display_name': 'Information technology. Security techniques. A framework for IT security assurance', 'publication_year': 2015, 'publication_date': '2015-06-10', 'ids': {'openalex': 'https://openalex.org/W4232461742', 'doi': 'https://doi.org/10.3403/19978206u'}, 'language': 'en', 'primary_location': {'is_oa': False, 'landing_page_url': 'https://doi.org/10.3403/19978206u', 'pdf_url': None, 'source': None, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}, 'type': 'standard', 'type_crossref': 'standard', 'indexed_in': ['crossref'], 'open_access': {'is_oa': False, 'oa_status': 'closed', 'oa_url': None, 'any_repository_has_fulltext': False}, 'authorships': [], 'institution_assertions': [], 'countries_distinct_count': 0, 'institutions_distinct_count': 0, 'corresponding_author_ids': [], 'corresponding_institution_ids': [], 'apc_list': None, 'apc_paid': None, 'fwci': None, 'has_fulltext': False, 'cited_by_count': 0, 'citation_normalized_percentile': {'value': 0.0, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 0, 'max': 66}, 'biblio': {'volume': None, 'issue': None, 'first_page': None, 'last_page': None}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T10734', 'display_name': 'Information Security Policy Compliance and Awareness', 'score': 0.8788, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T10734', 'display_name': 'Information Security Policy Compliance and Awareness', 'score': 0.8788, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/information-assurance', 'display_name': 'Information assurance', 'score': 0.7720344}, {'id': 'https://openalex.org/keywords/information-security', 'display_name': 'Information Security', 'score': 0.620796}, {'id': 'https://openalex.org/keywords/security-awareness', 'display_name': 'Security Awareness', 'score': 0.563521}, {'id': 'https://openalex.org/keywords/information-security-audit', 'display_name': 'Information security audit', 'score': 0.5605552}, {'id': 'https://openalex.org/keywords/information-security-management', 'display_name': 'Information security management', 'score': 0.5486839}, {'id': 'https://openalex.org/keywords/information-systems-security', 'display_name': 'Information systems security', 'score': 0.5165528}], 'concepts': [{'id': 'https://openalex.org/C2780795517', 'wikidata': 'https://www.wikidata.org/wiki/Q6030997', 'display_name': 'Information assurance', 'level': 3, 'score': 0.7720344}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.7344569}, {'id': 'https://openalex.org/C527648132', 'wikidata': 'https://www.wikidata.org/wiki/Q189900', 'display_name': 'Information security', 'level': 2, 'score': 0.6882683}, {'id': 'https://openalex.org/C39358052', 'wikidata': 'https://www.wikidata.org/wiki/Q2578632', 'display_name': 'Information security audit', 'level': 5, 'score': 0.5605552}, {'id': 'https://openalex.org/C148976360', 'wikidata': 'https://www.wikidata.org/wiki/Q1662500', 'display_name': 'Information security management', 'level': 5, 'score': 0.5486839}, {'id': 'https://openalex.org/C103377522', 'wikidata': 'https://www.wikidata.org/wiki/Q3493999', 'display_name': 'Security information and event management', 'level': 4, 'score': 0.53857064}, {'id': 'https://openalex.org/C2988319471', 'wikidata': 'https://www.wikidata.org/wiki/Q189900', 'display_name': 'Information systems security', 'level': 4, 'score': 0.5165528}, {'id': 'https://openalex.org/C62913178', 'wikidata': 'https://www.wikidata.org/wiki/Q7554361', 'display_name': 'Software security assurance', 'level': 4, 'score': 0.5040254}, {'id': 'https://openalex.org/C184842701', 'wikidata': 'https://www.wikidata.org/wiki/Q370563', 'display_name': 'Cloud computing security', 'level': 3, 'score': 0.4731544}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.45624772}, {'id': 'https://openalex.org/C47309137', 'wikidata': 'https://www.wikidata.org/wiki/Q7598357', 'display_name': 'Standard of Good Practice', 'level': 5, 'score': 0.42065537}, {'id': 'https://openalex.org/C108827166', 'wikidata': 'https://www.wikidata.org/wiki/Q175975', 'display_name': 'Internet privacy', 'level': 1, 'score': 0.3915484}, {'id': 'https://openalex.org/C29983905', 'wikidata': 'https://www.wikidata.org/wiki/Q7445066', 'display_name': 'Security service', 'level': 3, 'score': 0.3907083}, {'id': 'https://openalex.org/C144133560', 'wikidata': 'https://www.wikidata.org/wiki/Q4830453', 'display_name': 'Business', 'level': 0, 'score': 0.38539207}, {'id': 'https://openalex.org/C180198813', 'wikidata': 'https://www.wikidata.org/wiki/Q121182', 'display_name': 'Information system', 'level': 2, 'score': 0.2142024}, {'id': 'https://openalex.org/C117110713', 'wikidata': 'https://www.wikidata.org/wiki/Q3394676', 'display_name': 'Network security policy', 'level': 4, 'score': 0.19209316}, {'id': 'https://openalex.org/C17744445', 'wikidata': 'https://www.wikidata.org/wiki/Q36442', 'display_name': 'Political science', 'level': 0, 'score': 0.12150198}, {'id': 'https://openalex.org/C29848774', 'wikidata': 'https://www.wikidata.org/wiki/Q61905', 'display_name': 'Management information systems', 'level': 3, 'score': 0.08544445}, {'id': 'https://openalex.org/C79974875', 'wikidata': 'https://www.wikidata.org/wiki/Q483639', 'display_name': 'Cloud computing', 'level': 2, 'score': 0.07396066}, {'id': 'https://openalex.org/C199539241', 'wikidata': 'https://www.wikidata.org/wiki/Q7748', 'display_name': 'Law', 'level': 1, 'score': 0.067640066}, {'id': 'https://openalex.org/C111919701', 'wikidata': 'https://www.wikidata.org/wiki/Q9135', 'display_name': 'Operating system', 'level': 1, 'score': 0.05755961}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': False, 'landing_page_url': 'https://doi.org/10.3403/19978206u', 'pdf_url': None, 'source': None, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}], 'best_oa_location': None, 'sustainable_development_goals': [], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 0, 'referenced_works': [], 'related_works': ['https://openalex.org/W870815736', 'https://openalex.org/W4386208045', 'https://openalex.org/W3149395033', 'https://openalex.org/W3127569544', 'https://openalex.org/W2584162156', 'https://openalex.org/W2497647994', 'https://openalex.org/W2483557577', 'https://openalex.org/W2474818065', 'https://openalex.org/W2126017555', 'https://openalex.org/W1550935725'], 'abstract_inverted_index': None, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W4232461742', 'counts_by_year': [], 'updated_date': '2024-09-14T08:50:35.761660', 'created_date': '2022-05-12'}